Author:
Choi Seung Geol,Katz Jonathan,Schröder Dominique,Yerukhimovich Arkady,Zhou Hong-Sheng
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference48 articles.
1. M. Abdalla, D. Catalano, D. Fiore. Verifiable random functions from identity-based key encapsulation, in Advances in Cryptology—Eurocrypt 2009, volume 5479 of LNCS (Springer, 2009), pp. 554–571.
2. Y. Aumann, Y. Lindell, Security against covert adversaries: efficient protocols for realistic adversaries. Journal of Cryptology, 23(2):281–343 (2010)
3. B. Barak, How to go beyond the black-box simulation barrier, in 42nd Annual Symposium on Foundations of Computer Science (IEEE, 2001), pp. 106–115
4. B. Barak, R. Canetti, J. B. Nielsen, R. Pass, Universally composable protocols with relaxed set-up assumptions, in 45th Annual Symposium on Foundations of Computer Science (IEEE, 2004), pp. 186–195
5. M. Blum, Coin flipping by telephone, in Proceedings of IEEE COMPCOM (1982), pp. 133–137
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Two-in-one oblivious signatures;Future Generation Computer Systems;2019-12